Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance.
Ragib HasanPublished in: ICDH (2022)
Keyphrases
- security requirements
- security issues
- security level
- mobile agent system
- security measures
- security mechanisms
- security analysis
- key management
- security protocols
- security properties
- security management
- key exchange protocol
- access control
- information security
- stream cipher
- security services
- cryptographic protocols
- data security
- security patterns
- data encryption
- security model
- electronic voting
- security architecture
- sensitive data
- mobile devices
- trusted computing
- digital rights management
- key distribution
- authentication protocol
- integrity verification
- information systems
- metadata
- medical devices
- private key
- diffie hellman
- rfid tags
- key agreement protocol
- public key cryptography
- high security
- key management scheme
- digital signature scheme
- public key encryption
- authentication scheme
- public key
- security policies
- mobile agents
- cloud computing
- rfid systems
- key exchange
- user authentication
- previously mentioned
- secure routing
- authentication mechanism
- network security
- key establishment
- smart card
- public key cryptosystem
- secure multiparty computation
- factor authentication
- intrusion detection
- secure communication
- resource constrained
- digital signature
- provably secure
- identity management
- key agreement
- health care
- privacy preserving
- unauthorized access